Collection of Facebook Bug Bounty Writeups
☆30Sep 16, 2023Updated 2 years ago
Alternatives and similar repositories for Facebook-BugBounty-Writeups
Users that are interested in Facebook-BugBounty-Writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Find The Admin Panel & SQL Injection Endpoints, Using Google Dorks !!!☆26Nov 15, 2024Updated last year
- Slides from various conferences and talks I've given☆14Oct 12, 2025Updated 5 months ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- A simple bash script for Web Cache Deception exploitation.☆16Oct 7, 2024Updated last year
- All About XSS☆16Oct 23, 2022Updated 3 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- Zextras Technical Documentation☆12Updated this week
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆39Oct 17, 2024Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆37Dec 13, 2024Updated last year
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆221Sep 25, 2025Updated 6 months ago
- Top disclosed reports from HackerOne☆10Apr 15, 2021Updated 4 years ago
- Deception implementation through analysis of BloodHound data☆55Updated this week
- Collection of some pentesting and bugbounty resources☆47Feb 5, 2022Updated 4 years ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 11 months ago
- A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.☆103Jan 1, 2025Updated last year
- Bash Scripting Cheatsheet for pen-testing!☆44Sep 3, 2023Updated 2 years ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- Compatible versions of the frida package for each version of the frida-tools package. Automatically updated through CI/CD☆24Mar 10, 2026Updated 2 weeks ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Mar 16, 2026Updated last week
- 🎯 Chrome Extension - Passive scanner for Dependency Confusion vulnerabilities in npm/PyPI packages☆26Jan 31, 2026Updated last month
- This repo contains different variants of Bug Bounty & Security & Pentest & Tech related Articles☆55Jan 7, 2025Updated last year
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 2 months ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- This script is a plugin for acme.sh to update CPanel DNS entries☆10Jan 30, 2023Updated 3 years ago
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites 🌧 🛰 📡☆17Jul 30, 2023Updated 2 years ago
- React Shell & Next.js RSC Exploit Tool (CVE-2025-55182)☆239Dec 12, 2025Updated 3 months ago
- My Powershell notes☆16Sep 27, 2022Updated 3 years ago
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- Solutions to Codewars katas☆11Jun 1, 2019Updated 6 years ago
- ☆19Nov 28, 2024Updated last year
- word-list, payloads , Resources☆28Oct 17, 2025Updated 5 months ago
- AI-VAPT is an autonomous AI-driven Vulnerability Assessment & Penetration Testing framework combining traditional VAPT with neural intell…☆88Oct 7, 2025Updated 5 months ago
- ☆11Apr 23, 2025Updated 11 months ago
- The repo contains all the the notes, slides, and study material for my workshop at DEFCON 32 at the Bug Bounty Village☆205Aug 13, 2024Updated last year